|
Lines 40-46
Link Here
|
| 40 |
|
40 |
|
| 41 |
<i class="AUTHORGROUP"><span class="CONTRIB">Written by</span> Bill Swingle.</i> <i |
41 |
<i class="AUTHORGROUP"><span class="CONTRIB">Written by</span> Bill Swingle.</i> <i |
| 42 |
class="AUTHORGROUP"><span class="CONTRIB">Enhanced by</span> Eric Ogren and Udo |
42 |
class="AUTHORGROUP"><span class="CONTRIB">Enhanced by</span> Eric Ogren and Udo |
| 43 |
Erdelhoff.</i> |
43 |
Erdelhoff.</i> |
| 44 |
|
44 |
|
| 45 |
<div class="SECT2"> |
45 |
<div class="SECT2"> |
| 46 |
<h2 class="SECT2"><a id="AEN37266" name="AEN37266">29.4.1 What Is It?</a></h2> |
46 |
<h2 class="SECT2"><a id="AEN37266" name="AEN37266">29.4.1 What Is It?</a></h2> |
|
Lines 552-560
Link Here
|
| 552 |
</pre> |
552 |
</pre> |
| 553 |
|
553 |
|
| 554 |
<p>These two lines force the slave to sync its maps with the maps on the master server. |
554 |
<p>These two lines force the slave to sync its maps with the maps on the master server. |
| 555 |
Although these entries are not mandatory, since the master server attempts to ensure any |
555 |
Although these entries are not mandatory since the master server attempts to ensure any |
| 556 |
changes to its NIS maps are communicated to its slaves and because password information |
556 |
changes to its NIS maps are communicated to its slaves, because password information |
| 557 |
is vital to systems depending on the server, it is a good idea to force the updates. This |
557 |
is vital to systems depending on the server it is a good idea to force the updates. This |
| 558 |
is more important on busy networks where map updates might not always complete.</p> |
558 |
is more important on busy networks where map updates might not always complete.</p> |
| 559 |
|
559 |
|
| 560 |
<p>Now, run the command <tt class="COMMAND">/etc/netstart</tt> on the slave server as |
560 |
<p>Now, run the command <tt class="COMMAND">/etc/netstart</tt> on the slave server as |
|
Lines 787-793
Link Here
|
| 787 |
<h2 class="SECT2"><a id="NETWORK-NETGROUPS" name="NETWORK-NETGROUPS">29.4.7 Using |
787 |
<h2 class="SECT2"><a id="NETWORK-NETGROUPS" name="NETWORK-NETGROUPS">29.4.7 Using |
| 788 |
Netgroups</a></h2> |
788 |
Netgroups</a></h2> |
| 789 |
|
789 |
|
| 790 |
<i class="AUTHORGROUP"><span class="CONTRIB">Contributed by</span> Udo Erdelhoff.</i> |
790 |
<i class="AUTHORGROUP"><span class="CONTRIB">Contributed by</span> Udo Erdelhoff.</i> |
| 791 |
|
791 |
|
| 792 |
<p>The method shown in the previous section works reasonably well if you need special |
792 |
<p>The method shown in the previous section works reasonably well if you need special |
| 793 |
rules for a very small number of users and/or machines. On larger networks, you <span |
793 |
rules for a very small number of users and/or machines. On larger networks, you <span |